US20090055431A1 - Privacy ontology for identifying and classifying personally identifiable information and a related gui - Google Patents
Privacy ontology for identifying and classifying personally identifiable information and a related gui Download PDFInfo
- Publication number
- US20090055431A1 US20090055431A1 US11/841,298 US84129807A US2009055431A1 US 20090055431 A1 US20090055431 A1 US 20090055431A1 US 84129807 A US84129807 A US 84129807A US 2009055431 A1 US2009055431 A1 US 2009055431A1
- Authority
- US
- United States
- Prior art keywords
- terms
- policy
- meta
- objects
- association
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Granted
Links
Images
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING OR COUNTING
- G06F—ELECTRIC DIGITAL DATA PROCESSING
- G06F16/00—Information retrieval; Database structures therefor; File system structures therefor
- G06F16/30—Information retrieval; Database structures therefor; File system structures therefor of unstructured textual data
- G06F16/36—Creation of semantic tools, e.g. ontology or thesauri
- G06F16/367—Ontology
Definitions
- the present disclosure relates generally to computer application systems, and particularly to a method and system for identifying and classifying information using ontology and a user interface application that enables a user to navigate data objects in a system using ontology to identify and classify personally identifiable information.
- PII personally identifiable information
- GUI graphical user interface
- categories e.g., Entertainment, Entertainment-Movies, and Entertainment-Television
- a given taxonomy term pointing to a particular set of web links.
- Such methodology does not allow for determining the system object that matches particular terms.
- Existing methodologies also do not provide any method of navigating an ontology of terms, that is, where the objects matching a particular term is dependent both on the given term (e.g., “Baker”), and also on the term's type, e.g., either the user ID “Baker,” or role “Baker”.
- Existing search methodologies do not provide a method of navigating data objects based on whether they are covered and/or protected by a given policy that includes the terms of a given ontology.
- a system and method that identifies and classifies personally identifiable information. It is also desirable to have an automated methodology that allows for identifying and classifying personally identifiable information. Still further, it is desirable to provide a user interface application such as a graphical user interface to enable a user to navigate through an ontology of terms to, for example, determine or view the dependency of various terms related to data objects in a system.
- the method in one aspect may comprise obtaining a list of terms and a policy that includes one or more of the terms, identifying a plurality of meta-tags used in a system, developing one or more mappings between the terms and the meta-tags, identifying system data objects in the system having one or more meta-tags, and creating for each meta-tag of each system data object identified, an association between the system data object and the one or more terms to which the meta-tag is mapped, the association indicating whether the system data object is or is not covered by the policy.
- a method of providing an association between a system's meta-tagged data objects and a list of terms, the association indicating which objects are and are not covered by a given policy may comprise obtaining an ontology comprising taxonomy of terms and their relationships, obtaining a policy including one or more of the terms, building a mapping between said one or more of the terms and system meta-tags using said taxonomy of terms, identifying system objects having one or more system meta-tags, and creating an association between each of said system objects and said one or more of the terms mapped to said one or more system meta-tags identified with said system object.
- a system for providing an association between a system's meta-tagged data objects and a list of terms, the association indicating which objects are and are not covered by a given policy may comprise a processor operable to obtain a list of terms and a policy that includes one or more of the terms.
- the processor may be further operable to identify a plurality of meta-tags used in a system and to build one or more mappings between the terms and the meta-tags.
- the processor may be also operable to identify all system data objects in the system having one or more meta-tags and create for each meta-tag of each system data object identified, an association between the system data object and the one or more terms to which the meta-tag is mapped.
- the association indicates whether the system data object is or is not covered by the policy.
- the system may further include a data store operable to store the association.
- a user interface system for allowing a user to navigate an association between a system's meta-tagged data objects and a list of terms, the association indicating which objects are and are not covered by a given policy.
- the user interface system may comprise a display module executable on a processor operable to prompt a user and receive from the user an identification of an ontology and an identification of a policy.
- the display module may be further operable to receive one or more system objects associated with the policy.
- the one or more system objects are determined from the association of system meta-tags and ontology of terms in the policy.
- the display module may be further operable to display one or more terms that caused the association to be made between said one or more system objects and the policy.
- a program storage device readable by a machine, tangibly embodying a program of instructions executable by the machine to perform the above described method steps may be also provided.
- FIG. 1 is an illustrative diagram showing an example of a network topology of one embodiment of the present disclosure.
- FIG. 2 is an illustrative block diagram showing an example of a POIN (Privacy Ontology Identification and Navigation) Server in one embodiment of the present disclosure.
- POIN Primary Ontology Identification and Navigation
- FIG. 3 is a flow diagram illustrating flow control of a POIN Server in one embodiment of the present disclosure.
- FIG. 4 is a flow diagram of the Query Handler in one embodiment of the present disclosure.
- FIG. 5 is an example of a privacy ontology-based graphical user interface in one embodiment of the current invention.
- FIG. 6 illustrates an example of a private ontology having a tree structure in one embodiment of the present disclosure.
- a privacy ontology of PII data types enables some automation of identifying and classifying personally identifiable data (PII) and other related tasks are provided.
- An ontology is a controlled vocabulary that describes objects and the relations between them in a formal way, and has a grammar for using the vocabulary terms to express something meaningful within a specified domain of interest.
- the vocabulary is used to make queries and assertions.
- Ontological commitments are agreements to use the vocabulary in a consistent way for knowledge sharing.
- An ontology can be implemented as a data model that represents a set of concepts within a domain and the relationships between those concepts. It is used to reason about the objects within that domain and to provide knowledge representation about the world or some part of it.
- Ontologies generally describe an individual or basic objects; classes or set, collections, or types of objects; attributes or properties, features, characteristics, or parameters that objects can have and share; relations or ways that objects can be related to one another; and events: the changing of attributes or relations.
- Ontologies can employ the information from taxonomies.
- ontologies define the relationships between the objects.
- a taxonomy is a hierarchical organization for sets of objects. Taxonomies are used to group similar kinds of items, things, persons, etc. together, placing more general definitions at the top of the hierarchy and more specific ones at lower nodes in the taxonomy.
- Two of the most well-known and widely accepted global taxonomies are the United Nations Standard Products and Services Code® (UNSPSC) and the North American Industrial Classification System (NAICS) taxonomy.
- An ontology may have a common root and domain-specific branches.
- the ontology may cover both unstructured and structured information.
- the ontology may address a number of challenges.
- the privacy ontology may provide users a mechanism that could be part of a tool or system to perform the task.
- the privacy ontology also could assist in the identification of unprotected data during simulation of a privacy policy.
- the privacy ontology may facilitate the setting of a risk classification level for de-identified data processed through a transformation engine.
- FIG. 6 illustrates an example of a privacy ontology.
- a privacy ontology may include a hierarchical organization of all of the types of data categories of PII and a rationale for the relationships between the levels and categories of information.
- This common root 602 may be supplemented by domain specific branches 604 for types of PII, for example, related to healthcare, finance, travel, or entertainment.
- the domain specific branches 604 may further be categorized into types 606 that apply to the specific domain.
- Each type 606 have sub-categories 608 of terms that apply to that type. Further branching may exist from the sub-categories 608 as is desired or needed.
- An organization may use the ontology as part of a larger text-analytics search tool, for example, to identify the PII data types in the organization's electronic information including data stores and business processes.
- the tool may be used to perform an initial identification and categorization of PII data elements automatically. An operator then may manually review the initial identification and categorization results and modify them as necessary.
- a privacy ontology of the present disclosure in one embodiment may enable this process, for example, by making initial automated matches that might be modified by a person.
- the privacy ontology of the present disclosure may further identify unprotected PII data through simulations of the privacy policy prior to deployment.
- a privacy ontology of the present disclosure may conduct a gap analysis to identify unaddressed or unprotected PII data through a simulation of what the privacy policy would enforce when implemented.
- a privacy ontology of the present disclosure in one embodiment may be augmented by a healthcare domain branch and enable the organization to set the proper level of abstraction of the data and provide all parties with a documented risk classification level for the actions taken.
- the method and system of the present disclosure in one embodiment are illustrated with respect to a POIN Server 1010 that enables the identification of personally identifiable information such as system data. It should be understood, however, that the method and system is not limited to the use of a server only; rather, any other means or mechanism may be used to implement the method and system of the present disclosure.
- the POIN server 1010 may relate to the rules of a given policy and the rules are made of the terms from a given ontology of terms.
- a graphical user interface enables a user to navigate system objects using the ontology of terms as keys.
- the OASIS XACML standard is an international standard for security access control policies and includes a privacy profile.
- the standard defines the elements in a complete privacy access control policy rule.
- a predefined grammar in one embodiment specifies that a given policy includes zero or more rules.
- a rule has the following form in one embodiment:
- Data category indicates the type of data object that is governed by the rule
- Examples of rules may include:
- FIG. 1 shows an example of a network topology that supports a method and system of the present disclosure.
- a client 1020 and a POIN Server 1010 are enabled to communicate to each other via a network 1030 .
- the client 1000 may be any computing node.
- the client 1000 may be a web client that can provide a web browser (HTTP client) capability.
- platforms that support the client 1000 may include but is not limited to any device that can act as web client, for example, including functionality for executing a web browser application and that can communicate with the server 1010 via the network 1030 .
- Such devices include, but are not limited to, an IBM ThinkPad® running Windows XP® and a web browser such as Microsoft's Internet Explorer®.
- Client devices may include a network-connectable mobile or portable functionality.
- Example may include devices such as those sold under the trademark WorkPad® by IBM, as well as smart cellular telephone devices which can act as a cellular telephone as well as run network applications such as web browsers.
- Another example of such mobile or portable devices may include, but is not limited to, Nokia 90008 by Nokia. Both of these mobile devices provide a web browsing application.
- the network 1030 includes, but is not limited to, the Internet, an internal intranet, or a wireless on wired telecommunication network.
- the POIN Server 1010 will be described in detail with reference to FIGS. 2-5 .
- FIG. 2 illustrates a more detailed component diagram of the POIN Server 1010 in one embodiment of the present disclosure.
- This server 1010 may comprise any computing node that is able to load and execute programmatic code, including, but not limited to: products sold by IBM such as ThinkPad® or PowerPC®, running the operating system and server application suite sold by Microsoft, e.g., Windows® XP, or a Linux operating system.
- the POIN server 1010 may include a processor device, CPU 2000 , a network interface 2010 , a storage device 2020 such as a magnetic or optical disk storage or a direct access storage device (DASD) or any other storage device, and a memory 2030 , such as RAM or any other memory device.
- DASD direct access storage device
- a server logic 2040 may be embodied as computer executable code that is loaded from, for example, a remote source (e.g., over the network 1030 via the network interface 2010 ), local permanent optical (CD-ROM), magnetic storage (such as disk), or DASD 2020 into memory 2030 for execution by CPU 2000 .
- a remote source e.g., over the network 1030 via the network interface 2010
- CD-ROM local permanent optical
- magnetic storage such as disk
- DASD 2020 e.g., DASD
- a memory 2030 may include computer readable instructions, data structures, program modules and application interfaces that provide the following functionalities: an HTTP Server Handler 2050 ; an Ontology and Policy Obtaining Handler 2060 , described in detail with reference to FIG. 3 ; a Term to Meta-tag Mapping Handler 2070 , described in detail with reference to FIG. 3 ; a System Object Identifying Handler 2080 , described in detail with reference to FIG. 3 ; a Term to System Object Association Handler 2090 , described in detail with reference to FIG. 3 ; a Policy Coverage Identifying Handler 2100 , described in detail with reference to FIG. 3 ; a POIN Query Handler 2110 , described in detail with reference to FIG. 4 ; and a POIN Server Database Handler 2120 .
- the HTTP Server Handler 2050 may be any application that implements functionality for responding to HTTP communications, and may be embodied as the WebSphere® product (e.g., a servlet execution engine) sold by IBM. In one embodiment, all communications between the web browser running on client 1020 and the handlers 2060 , 2070 , 2080 , 2090 , 2100 , 2110 , 2120 running of the point server 1010 are performed through this handler 2050 using the HTTP protocol.
- a person of ordinary skill in the technological art will appreciate that other forms of network communication could also be used, including but not limited to simple BSD socket based TCP/IP.
- the POIN server database handler 2120 provides for creation, deletion and modification of persistent data, and may be used by the handlers 2060 , 2070 , 2080 , 2090 , 2100 , 2110 , 2120 of the POIN server 1010 .
- An example of a product providing such function includes the DB/2 database system produced by IBM.
- FIG. 3 is a flow diagram illustrating a control flow of the POIN server's logic 2040 in one embodiment of the present disclosure.
- the POIN server 1010 waits for input.
- step 3010 determines whether it is a request for the data held in the POIN Server Database 2120 to be initialized or updated. In one embodiment of the method and system of the present disclosure, this request can come as a web request from the web browser running on the client 1020 . If the input is a request for the POIN Server Database Handler's data to be initialized (i.e., create for the first time), or updated (i.e., recalculated), then in step 3020 an Ontology and Policy Obtaining Handler 2060 is invoked.
- This handler 2060 retrieves the ontology.
- the handler 2060 retrieves the ontology from the Storage Device 2020 and it is then called into Memory 2030 or it may be stored dynamically in Memory 2030 .
- the one or more policies that handlers 2060 , 2070 , 2080 , 2090 , 2100 , 2110 , 2120 may use the retrieved ontology.
- the Ontology and Policy Obtaining Handler 2060 stores both the ontology (e.g., each term, its type and its inter-relationship with other terms) and the policy (e.g., the XACML encoding) in the POIN Server Database 2120 .
- a user may author the policy using the OASIS XACML standard or some other standard.
- the user-authored policy may be stored in the Storage Device 2020 and/or dynamically in Memory 2030 .
- an ontology could be calculated from a given policy, for example, the terms, their type, etc. may be parsed from the given policy. Given this approach, every term would be in the given policy. More than one policy may be specified and handled, for example, more than one policy may be parsed to create ontologies.
- the Ontology and Policy Obtaining Handler 2060 stores all of the specified policies in the database 2120 , and if necessary, extracts ontology terms from all of the specified policies as well.
- a mapping between all of the system meta-tags and the terms of the ontology is created by the Term to Meta-tag Mapping Handler 2070 .
- This mapping provides an association between system meta-tag (e.g., UID or read-accessible) and one or more ontology terms.
- system meta-tag e.g., UID or read-accessible
- a system meta-tag is information about an object in a system.
- An object may have a meta-tag is associated with it in the system through use of a table, file, or other mechanism.
- the system meta-tag read-accessible associated with a file object on a system would be mapped to both the term “read” and “view.”
- Each of the these mappings is stored by the POIN Server Database Handler 2120 .
- all of the meta-tagged system objects are identified by the system Object Identifying Handler 2080 . This involves scanning the system's resources, possibly with the help of one or more of the system's resource managers (e.g., the Linux File system, Windows File Manager, etc.) and determining all of the meta-tags that apply to each of the identified system objects.
- each system object and meta-tag associations is stored for possible later use via the POIN Server Database Handler 2120 .
- the associations between all of the terms and system objects are determined by the Term to System Object Association Handler 2090 , which stores each of the these associations for later possible use with the POIN Server Database Handler 2120 .
- this may be accomplished by first retrieving a list of all of the meta-tagged system objects from the POIN Server Database Handler 2120 , determining for each meta-tagged object a list of all of the meta-tags associated with the given object, and associating all of the terms mapped to each given meta-tag to the given system object, all of the term to system object association being stored via the POIN Server Database Handler 2120 .
- a Policy Coverage Identifying Handler 2100 determines which of the system objects are covered by the specified privacy policies.
- a given system object to be covered by a given policy if there is at least one rule in the given policy whose term values for each of the user, action and data categories match the mapped term value of the given system object.
- the object, “c:/users/johndoe/ssn.txt” matches the Billing Policy because this policy contains the rule: “Accounting department can access the SSN of patients for the purpose of billing” and the object's owner is mapped to the term “Billing department” and the object's access rights include “read” which is mapped to the action “access”, and the object's full file name is mapped to the data category “SSN”.
- the Policy Coverage Identifying Handler 2100 determines such coverage for all of the meta-tagged system objects and all of the specified policies, all associations being store using the POIN Server Database Handler 2120 in one embodiment. Following this, control continues at step 3000 .
- mapping between the system policies and the system objects is updated and the completeness of the coverage is being determined. For instance, if there was a gap—that is, a system policy element that was not mapped to a system object, it would be identified at this point in the method.
- step 3070 checks whether it is a request to query the existing or current data. If so, then, at step 3080 , a POIN Query Handler 2110 (described in detail with reference to FIG. 4 ) is invoked, following which, control continues at step 3000 . If the input is not a query, then a miscellaneous handler may be invoked in step 3090 to respond to the miscellaneous request, following which control continues at step 3000 .
- FIG. 4 is a flow diagram illustrating a control flow of a POIN Query Handler 2110 in one embodiment of the present disclosure.
- the handler 2110 receives, for example, requests sent from an applet running on the web browser running on the client 1020 , determines the matching system objects and then returns this data to the applet, for example, for display to an end-user.
- the POIN Query Handler 2110 determines which system objects match the requested terms from the ontology. In one embodiment of the present disclosure, this may be accomplished by sending an SQL query to the POIN Server Database Handler 2120 , which requests this data. At step 4020 the POIN Query Handler 2110 determines which of the matching system objects are covered by which of the specified policies. Once complete, step 4030 sends the matching system object data along with the policy coverage data back to the applet running on the web browser on the client 1020 , possibly to be displayed or provided for interaction to an end-user.
- FIG. 5 is an example of a POIN GUI 5000 in one embodiment of the present disclosure.
- the GUT may be provided by the applet running on the web browser of the client 1020 .
- the GUI provides an interface for a user to interact with personally identifiable information in the computer system. For example, in the context of a Medical ontology for the US being employed in a computer system in NY, a user wants to use that ontology to tie or map the system policies to the system objects. A user may select or enter this ontology on the GUI, for example, shown at 5010 .
- the GUI may display or otherwise provide or prompt a user to select an ontology, for example, from a dropdown list of ontologies. Ontologies can employ the information from taxonomies.
- ontologies define the relationships between the nodes in the ontologies.
- a user may select one or more policies 5020 to which the user desires to map the system objects.
- the GUI may list one or more policies, which the user may select, for example, using radio buttons 5050 , 5060 , or clicking on an item in a dropdown list, etc.
- a user works with two policies, one related to medical tests 5030 and a second related to accounting 5040 .
- the GUI also enables the user to view the elements in the policy and determine policy coverage 5320 through the display of the mapping or matching of the system objects to the policies.
- the display shows that two system objects 5280 , 5290 are covered by the Testing policy 5330 as denoted by ‘X’ marks 5350 , 5360 and two system objects 5300 , 5310 are covered by the Accounting policy 5340 as denoted by ‘X’ marks 5370 , 5380 .
- Any other mechanism may be used to show or denote that a given object is covered by a given policy, including but not limited to, highlighting, using different color notations, fonts, etc.
- the GUI may also provide a display or otherwise show one or more elements that triggered the finding of matches between the system objects and the policies. For instance, in the user categories 5070 , there was a match in the doctors and patients categories 5080 , 5090 .
- the elements may be shown as a list, highlighted radio buttons 5100 , 5110 , or in any other way.
- the example in FIG. 5 also shows elements that caused the mapping in the actions category 5120 .
- the highlighted radio button 5150 associated with read action category 5120 may indicate that the read element in the action category contributed to the mapping.
- the update action 5140 is not highlighted by its radio button 5160 . This may indicate that the update action was not part of the mapping.
- both the test results 5180 and address 5190 elements have highlighted radio buttons 5200 , 5210 , indicating that both data category element were in the mapping.
- treatment 5230 element has highlighted radio button 5200
- research 5240 element's radio button 5260 is not highlighted, indicating that the treatment 5230 element contributed to the mapping while the research 5240 element did not. Any other mechanism of showing or otherwise providing elements that were involved in the matching of the system objects to the selected policies may be used in the GUI.
- the system and method of the present disclosure may be implemented and run on a general-purpose computer or computer system.
- the computer system may be any type of known or will be known systems and may typically include a processor, memory device, a storage device, input/output devices, internal buses, and/or a communications interface for communicating with other computer systems in conjunction with communication hardware and software, etc.
- the terms “computer system” and “computer network” as may be used in the present application may include a variety of combinations of fixed and/or portable computer hardware, software, peripherals, and storage devices.
- the computer system may include a plurality of individual components that are networked or otherwise linked to perform collaboratively, or may include one or more stand-alone components.
- the hardware and software components of the computer system of the present application may include and may be included within fixed and portable devices such as desktop, laptop, and/or server.
- a module may be a component of a device, software, program, or system that implements some “functionality”, which can be embodied as software, hardware, firmware, electronic circuitry, or etc.
Abstract
Description
- The present invention is related to the following commonly-owned, co-pending United States patent applications filed on even date herewith, the entire contents and disclosure of each of which is expressly incorporated by reference herein as if fully set forth herein. U.S. patent application Ser. No. (YOR920070128US1 (20981-1)), for “A PRIVACY ONTOLOGY FOR IDENTIFYING AND CLASSIFYING PERSONALLY IDENTIFIABLE INFORMATION AND A RELATED GUI”.
- The present disclosure relates generally to computer application systems, and particularly to a method and system for identifying and classifying information using ontology and a user interface application that enables a user to navigate data objects in a system using ontology to identify and classify personally identifiable information.
- Currently, it is very time-consuming and difficult for people in an organization to identify and classify personally identifiable information (PII) in the organization's computer application systems. Personally identifiable information refers to data concerning an individual, or data from which the identity of an individual may be deduced. Known technology identifies such data primarily through manual processes. There are currently no automated methods of identifying PII data and labeling that data as such. The manual methods for identifying PII are labor intensive, difficult, and subject to error. The current privacy technology product on the market such as the Tivoli Privacy Manager does not contain privacy ontology and cannot be used to solve the identified problems above.
- Yahoo provides a graphical user interface (GUI) for navigating web pages based on a taxonomy of categories (e.g., Entertainment, Entertainment-Movies, and Entertainment-Television), a given taxonomy term pointing to a particular set of web links. Such methodology, however, does not allow for determining the system object that matches particular terms. Existing methodologies also do not provide any method of navigating an ontology of terms, that is, where the objects matching a particular term is dependent both on the given term (e.g., “Baker”), and also on the term's type, e.g., either the user ID “Baker,” or role “Baker”. Existing search methodologies do not provide a method of navigating data objects based on whether they are covered and/or protected by a given policy that includes the terms of a given ontology.
- Thus, it is desirable to have a system and method that identifies and classifies personally identifiable information. It is also desirable to have an automated methodology that allows for identifying and classifying personally identifiable information. Still further, it is desirable to provide a user interface application such as a graphical user interface to enable a user to navigate through an ontology of terms to, for example, determine or view the dependency of various terms related to data objects in a system.
- Method and system for providing an association between a system's meta-tagged data objects and a list of terms, the association indicating which objects are and are not covered by a given policy are provided. The method in one aspect may comprise obtaining a list of terms and a policy that includes one or more of the terms, identifying a plurality of meta-tags used in a system, developing one or more mappings between the terms and the meta-tags, identifying system data objects in the system having one or more meta-tags, and creating for each meta-tag of each system data object identified, an association between the system data object and the one or more terms to which the meta-tag is mapped, the association indicating whether the system data object is or is not covered by the policy.
- In another aspect, a method of providing an association between a system's meta-tagged data objects and a list of terms, the association indicating which objects are and are not covered by a given policy, may comprise obtaining an ontology comprising taxonomy of terms and their relationships, obtaining a policy including one or more of the terms, building a mapping between said one or more of the terms and system meta-tags using said taxonomy of terms, identifying system objects having one or more system meta-tags, and creating an association between each of said system objects and said one or more of the terms mapped to said one or more system meta-tags identified with said system object.
- A system for providing an association between a system's meta-tagged data objects and a list of terms, the association indicating which objects are and are not covered by a given policy, in one aspect, may comprise a processor operable to obtain a list of terms and a policy that includes one or more of the terms. The processor may be further operable to identify a plurality of meta-tags used in a system and to build one or more mappings between the terms and the meta-tags. The processor may be also operable to identify all system data objects in the system having one or more meta-tags and create for each meta-tag of each system data object identified, an association between the system data object and the one or more terms to which the meta-tag is mapped. The association indicates whether the system data object is or is not covered by the policy. The system may further include a data store operable to store the association.
- In another aspect, a user interface system for allowing a user to navigate an association between a system's meta-tagged data objects and a list of terms, the association indicating which objects are and are not covered by a given policy, is provided. The user interface system, in one aspect, may comprise a display module executable on a processor operable to prompt a user and receive from the user an identification of an ontology and an identification of a policy. The display module may be further operable to receive one or more system objects associated with the policy. The one or more system objects are determined from the association of system meta-tags and ontology of terms in the policy. The display module may be further operable to display one or more terms that caused the association to be made between said one or more system objects and the policy.
- A program storage device readable by a machine, tangibly embodying a program of instructions executable by the machine to perform the above described method steps may be also provided.
- Further features as well as the structure and operation of various embodiments are described in detail below with reference to the accompanying drawings. In the drawings, like reference numbers indicate identical or functionally similar elements.
-
FIG. 1 is an illustrative diagram showing an example of a network topology of one embodiment of the present disclosure. -
FIG. 2 is an illustrative block diagram showing an example of a POIN (Privacy Ontology Identification and Navigation) Server in one embodiment of the present disclosure. -
FIG. 3 is a flow diagram illustrating flow control of a POIN Server in one embodiment of the present disclosure. -
FIG. 4 is a flow diagram of the Query Handler in one embodiment of the present disclosure. -
FIG. 5 is an example of a privacy ontology-based graphical user interface in one embodiment of the current invention. -
FIG. 6 illustrates an example of a private ontology having a tree structure in one embodiment of the present disclosure. - In one embodiment of the method and system of the present disclosure, a privacy ontology of PII data types enables some automation of identifying and classifying personally identifiable data (PII) and other related tasks are provided. An ontology is a controlled vocabulary that describes objects and the relations between them in a formal way, and has a grammar for using the vocabulary terms to express something meaningful within a specified domain of interest. The vocabulary is used to make queries and assertions. Ontological commitments are agreements to use the vocabulary in a consistent way for knowledge sharing.
- An ontology can be implemented as a data model that represents a set of concepts within a domain and the relationships between those concepts. It is used to reason about the objects within that domain and to provide knowledge representation about the world or some part of it. Ontologies generally describe an individual or basic objects; classes or set, collections, or types of objects; attributes or properties, features, characteristics, or parameters that objects can have and share; relations or ways that objects can be related to one another; and events: the changing of attributes or relations.
- Ontologies can employ the information from taxonomies. In addition, ontologies define the relationships between the objects. A taxonomy is a hierarchical organization for sets of objects. Taxonomies are used to group similar kinds of items, things, persons, etc. together, placing more general definitions at the top of the hierarchy and more specific ones at lower nodes in the taxonomy. Two of the most well-known and widely accepted global taxonomies are the United Nations Standard Products and Services Code® (UNSPSC) and the North American Industrial Classification System (NAICS) taxonomy.
- An ontology may have a common root and domain-specific branches. The ontology may cover both unstructured and structured information. The ontology may address a number of challenges. The privacy ontology may provide users a mechanism that could be part of a tool or system to perform the task. The privacy ontology also could assist in the identification of unprotected data during simulation of a privacy policy. Still yet, the privacy ontology may facilitate the setting of a risk classification level for de-identified data processed through a transformation engine.
-
FIG. 6 illustrates an example of a privacy ontology. As an example, a privacy ontology may include a hierarchical organization of all of the types of data categories of PII and a rationale for the relationships between the levels and categories of information. There may be acommon root 602 of these terms that applies to all people. Thiscommon root 602 may be supplemented by domainspecific branches 604 for types of PII, for example, related to healthcare, finance, travel, or entertainment. The domainspecific branches 604 may further be categorized intotypes 606 that apply to the specific domain. Eachtype 606 havesub-categories 608 of terms that apply to that type. Further branching may exist from thesub-categories 608 as is desired or needed. - An organization may use the ontology as part of a larger text-analytics search tool, for example, to identify the PII data types in the organization's electronic information including data stores and business processes. The tool may be used to perform an initial identification and categorization of PII data elements automatically. An operator then may manually review the initial identification and categorization results and modify them as necessary.
- In creating privacy policies enforced through technology, the identification and matching of PII data types in privacy policies expressed in natural language or machine readable form needs to be matched to the locations where the PIT is stored. A privacy ontology of the present disclosure in one embodiment may enable this process, for example, by making initial automated matches that might be modified by a person. The privacy ontology of the present disclosure may further identify unprotected PII data through simulations of the privacy policy prior to deployment. For example, if a privacy policy is authored and the ontology is used to identify PII data elements in data stores, a privacy ontology of the present disclosure as part of another tool or system may conduct a gap analysis to identify unaddressed or unprotected PII data through a simulation of what the privacy policy would enforce when implemented.
- In some circumstances, such as medical research, it is necessary to be able to de-identify PII data to an appropriate level of abstraction so that the medical research can proceed and yet the identities of those persons providing PII is protected. If the data is de-identified to a large degree, the risk of inappropriate disclosure may be very low, however, the remaining data may be of little or no value to medical researchers. And vice versa, if the PII data is not de-identified enough, the medical researchers may have more PII information than is needed and the risk of inappropriate disclosure of PII is high. A privacy ontology of the present disclosure in one embodiment may be augmented by a healthcare domain branch and enable the organization to set the proper level of abstraction of the data and provide all parties with a documented risk classification level for the actions taken.
- In the description below, the method and system of the present disclosure in one embodiment are illustrated with respect to a
POIN Server 1010 that enables the identification of personally identifiable information such as system data. It should be understood, however, that the method and system is not limited to the use of a server only; rather, any other means or mechanism may be used to implement the method and system of the present disclosure. Referring toFIG. 1 , thePOIN server 1010 may relate to the rules of a given policy and the rules are made of the terms from a given ontology of terms. In another embodiment, a graphical user interface (GUI) enables a user to navigate system objects using the ontology of terms as keys. The example below assumes the policies adhere to the privacy profile of the OASIS XACML standard provide link to standard and supply hardcopy with application). Briefly, the OASIS XACML standard is an international standard for security access control policies and includes a privacy profile. The standard defines the elements in a complete privacy access control policy rule. A predefined grammar in one embodiment specifies that a given policy includes zero or more rules. A rule has the following form in one embodiment: - (User category) (Permission) (Action) (Data category) (Purpose) (Condition optional) where:
- (User category) indicates applicable role or user for the given rule;
- (Permission) indicates whether the result of the rule is the permitting or the denial of access;
- (Action) specifies the function or application that is either permitted or denied by the given rule,
- (Data category) indicates the type of data object that is governed by the rule,
- (Purpose) indicates the reason the given role is attempting to perform the given action to the given data category, and
- an optional (Condition), which specifies Boolean (true or false) function that is evaluated whenever the given rule is checked, the given rule only being acted upon if the given condition is true.
- Examples of rules may include:
- “Doctors can read blood test results for the purpose of medical treatment”
User category=Doctors - Action=read
Data category=blood test results
Purpose=medical treatment - “Nurses cannot read patient addresses for the purpose of billing.”
- User category=Nurses
Permission=cannot
Action=read
Data category=patients addresses
Purpose=billing -
FIG. 1 shows an example of a network topology that supports a method and system of the present disclosure. Aclient 1020 and aPOIN Server 1010 are enabled to communicate to each other via anetwork 1030. Theclient 1000 may be any computing node. Theclient 1000 may be a web client that can provide a web browser (HTTP client) capability. Examples of platforms that support theclient 1000 may include but is not limited to any device that can act as web client, for example, including functionality for executing a web browser application and that can communicate with theserver 1010 via thenetwork 1030. Such devices include, but are not limited to, an IBM ThinkPad® running Windows XP® and a web browser such as Microsoft's Internet Explorer®. Client devices may include a network-connectable mobile or portable functionality. Example may include devices such as those sold under the trademark WorkPad® by IBM, as well as smart cellular telephone devices which can act as a cellular telephone as well as run network applications such as web browsers. Another example of such mobile or portable devices may include, but is not limited to, Nokia 90008 by Nokia. Both of these mobile devices provide a web browsing application. A person of ordinary skill in the technological art will appreciate that although only asingle client 1000 is shown inFIG. 1 , the method and system of the present disclosure also may cover any number ofsuch clients 1000. Thenetwork 1030 includes, but is not limited to, the Internet, an internal intranet, or a wireless on wired telecommunication network. ThePOIN Server 1010 will be described in detail with reference toFIGS. 2-5 . -
FIG. 2 illustrates a more detailed component diagram of thePOIN Server 1010 in one embodiment of the present disclosure. Thisserver 1010 may comprise any computing node that is able to load and execute programmatic code, including, but not limited to: products sold by IBM such as ThinkPad® or PowerPC®, running the operating system and server application suite sold by Microsoft, e.g., Windows® XP, or a Linux operating system. As shown inFIG. 2 , thePOIN server 1010 may include a processor device,CPU 2000, anetwork interface 2010, astorage device 2020 such as a magnetic or optical disk storage or a direct access storage device (DASD) or any other storage device, and amemory 2030, such as RAM or any other memory device. Aserver logic 2040 may be embodied as computer executable code that is loaded from, for example, a remote source (e.g., over thenetwork 1030 via the network interface 2010), local permanent optical (CD-ROM), magnetic storage (such as disk), orDASD 2020 intomemory 2030 for execution byCPU 2000. - A
memory 2030 may include computer readable instructions, data structures, program modules and application interfaces that provide the following functionalities: anHTTP Server Handler 2050; an Ontology andPolicy Obtaining Handler 2060, described in detail with reference toFIG. 3 ; a Term to Meta-tag Mapping Handler 2070, described in detail with reference toFIG. 3 ; a SystemObject Identifying Handler 2080, described in detail with reference toFIG. 3 ; a Term to SystemObject Association Handler 2090, described in detail with reference toFIG. 3 ; a PolicyCoverage Identifying Handler 2100, described in detail with reference toFIG. 3 ; aPOIN Query Handler 2110, described in detail with reference toFIG. 4 ; and a POINServer Database Handler 2120. - The
HTTP Server Handler 2050 may be any application that implements functionality for responding to HTTP communications, and may be embodied as the WebSphere® product (e.g., a servlet execution engine) sold by IBM. In one embodiment, all communications between the web browser running onclient 1020 and thehandlers point server 1010 are performed through thishandler 2050 using the HTTP protocol. A person of ordinary skill in the technological art will appreciate that other forms of network communication could also be used, including but not limited to simple BSD socket based TCP/IP. - The POIN
server database handler 2120, in one embodiment, provides for creation, deletion and modification of persistent data, and may be used by thehandlers POIN server 1010. An example of a product providing such function includes the DB/2 database system produced by IBM. -
FIG. 3 is a flow diagram illustrating a control flow of the POIN server'slogic 2040 in one embodiment of the present disclosure. Atstep 3000, thePOIN server 1010 waits for input. When an input is received,step 3010 determines whether it is a request for the data held in thePOIN Server Database 2120 to be initialized or updated. In one embodiment of the method and system of the present disclosure, this request can come as a web request from the web browser running on theclient 1020. If the input is a request for the POIN Server Database Handler's data to be initialized (i.e., create for the first time), or updated (i.e., recalculated), then instep 3020 an Ontology andPolicy Obtaining Handler 2060 is invoked. Thishandler 2060 retrieves the ontology. In one embodiment, thehandler 2060 retrieves the ontology from theStorage Device 2020 and it is then called intoMemory 2030 or it may be stored dynamically inMemory 2030. The one or more policies thathandlers Policy Obtaining Handler 2060 stores both the ontology (e.g., each term, its type and its inter-relationship with other terms) and the policy (e.g., the XACML encoding) in thePOIN Server Database 2120. In one embodiment, a user may author the policy using the OASIS XACML standard or some other standard. The user-authored policy may be stored in theStorage Device 2020 and/or dynamically inMemory 2030. A person of ordinary skill in the technological art will appreciate that an ontology could be calculated from a given policy, for example, the terms, their type, etc. may be parsed from the given policy. Given this approach, every term would be in the given policy. More than one policy may be specified and handled, for example, more than one policy may be parsed to create ontologies. In one embodiment, the Ontology andPolicy Obtaining Handler 2060 stores all of the specified policies in thedatabase 2120, and if necessary, extracts ontology terms from all of the specified policies as well. - At
step 3030, a mapping between all of the system meta-tags and the terms of the ontology is created by the Term to Meta-tag Mapping Handler 2070. This mapping provides an association between system meta-tag (e.g., UID or read-accessible) and one or more ontology terms. Generally, a system meta-tag is information about an object in a system. An object may have a meta-tag is associated with it in the system through use of a table, file, or other mechanism. For example, the system meta-tag read-accessible associated with a file object on a system would be mapped to both the term “read” and “view.” Each of the these mappings is stored by the POINServer Database Handler 2120. - At
step 3040, all of the meta-tagged system objects are identified by the systemObject Identifying Handler 2080. This involves scanning the system's resources, possibly with the help of one or more of the system's resource managers (e.g., the Linux File system, Windows File Manager, etc.) and determining all of the meta-tags that apply to each of the identified system objects. In one embodiment of the method and system of the present disclosure, each system object and meta-tag associations is stored for possible later use via the POINServer Database Handler 2120. - At
step 3050, the associations between all of the terms and system objects are determined by the Term to SystemObject Association Handler 2090, which stores each of the these associations for later possible use with the POINServer Database Handler 2120. In one embodiment of the method and system of the present disclosure, this may be accomplished by first retrieving a list of all of the meta-tagged system objects from the POINServer Database Handler 2120, determining for each meta-tagged object a list of all of the meta-tags associated with the given object, and associating all of the terms mapped to each given meta-tag to the given system object, all of the term to system object association being stored via the POINServer Database Handler 2120. - At
step 3060, a PolicyCoverage Identifying Handler 2100 determines which of the system objects are covered by the specified privacy policies. In one embodiment of the method and system of the present disclosure, a given system object to be covered by a given policy if there is at least one rule in the given policy whose term values for each of the user, action and data categories match the mapped term value of the given system object. For example, the object, “c:/users/johndoe/ssn.txt” matches the Billing Policy because this policy contains the rule: “Accounting department can access the SSN of patients for the purpose of billing” and the object's owner is mapped to the term “Billing department” and the object's access rights include “read” which is mapped to the action “access”, and the object's full file name is mapped to the data category “SSN”. The PolicyCoverage Identifying Handler 2100 in one embodiment determines such coverage for all of the meta-tagged system objects and all of the specified policies, all associations being store using the POINServer Database Handler 2120 in one embodiment. Following this, control continues atstep 3000. The mapping between the system policies and the system objects is updated and the completeness of the coverage is being determined. For instance, if there was a gap—that is, a system policy element that was not mapped to a system object, it would be identified at this point in the method. - If the request is not one to create or update the database handler's 2120 data, then step 3070 checks whether it is a request to query the existing or current data. If so, then, at
step 3080, a POIN Query Handler 2110 (described in detail with reference toFIG. 4 ) is invoked, following which, control continues atstep 3000. If the input is not a query, then a miscellaneous handler may be invoked instep 3090 to respond to the miscellaneous request, following which control continues atstep 3000. -
FIG. 4 is a flow diagram illustrating a control flow of aPOIN Query Handler 2110 in one embodiment of the present disclosure. In this embodiment, thehandler 2110 receives, for example, requests sent from an applet running on the web browser running on theclient 1020, determines the matching system objects and then returns this data to the applet, for example, for display to an end-user. At step 400, thePOIN Query Handler 2110 parses the requested terms and their associated values from the specified query. This may include determining which term values are included in the query (for example, user category, action data category, but no purpose) and the values for each of the requested terms. For example, user category=“Billing department,” action=“access” and data category=“SSN” or “address”. Atstep 4010, thePOIN Query Handler 2110 determines which system objects match the requested terms from the ontology. In one embodiment of the present disclosure, this may be accomplished by sending an SQL query to the POINServer Database Handler 2120, which requests this data. Atstep 4020 thePOIN Query Handler 2110 determines which of the matching system objects are covered by which of the specified policies. Once complete, step 4030 sends the matching system object data along with the policy coverage data back to the applet running on the web browser on theclient 1020, possibly to be displayed or provided for interaction to an end-user. -
FIG. 5 is an example of aPOIN GUI 5000 in one embodiment of the present disclosure. The GUT may be provided by the applet running on the web browser of theclient 1020. The GUI provides an interface for a user to interact with personally identifiable information in the computer system. For example, in the context of a Medical ontology for the US being employed in a computer system in NY, a user wants to use that ontology to tie or map the system policies to the system objects. A user may select or enter this ontology on the GUI, for example, shown at 5010. For instance, the GUI may display or otherwise provide or prompt a user to select an ontology, for example, from a dropdown list of ontologies. Ontologies can employ the information from taxonomies. In addition, ontologies define the relationships between the nodes in the ontologies. Similarly, a user may select one ormore policies 5020 to which the user desires to map the system objects. The GUI, for instance, may list one or more policies, which the user may select, for example, usingradio buttons FIG. 5 , a user works with two policies, one related tomedical tests 5030 and a second related toaccounting 5040. - The selected ontologies and policies are then used to find the matching system objects that are covered under the selected policies, for example, as described with reference to
FIG. 3 andFIG. 4 . In one embodiment, the GUI also enables the user to view the elements in the policy and determinepolicy coverage 5320 through the display of the mapping or matching of the system objects to the policies. In the example shown inFIG. 5 , the display shows that twosystem objects Testing policy 5330 as denoted by ‘X’ marks 5350, 5360 and twosystem objects Accounting policy 5340 as denoted by ‘X’ marks 5370, 5380. Any other mechanism may be used to show or denote that a given object is covered by a given policy, including but not limited to, highlighting, using different color notations, fonts, etc. - In one embodiment, the GUI may also provide a display or otherwise show one or more elements that triggered the finding of matches between the system objects and the policies. For instance, in the
user categories 5070, there was a match in the doctors andpatients categories radio buttons FIG. 5 also shows elements that caused the mapping in theactions category 5120. For instance, the highlightedradio button 5150 associated withread action category 5120 may indicate that the read element in the action category contributed to the mapping. In the example shown inFIG. 5 , theupdate action 5140 is not highlighted by itsradio button 5160. This may indicate that the update action was not part of the mapping. Similarly, in thedata categories 5170, both thetest results 5180 andaddress 5190 elements have highlightedradio buttons purposes category 5220,treatment 5230 element has highlightedradio button 5200, andresearch 5240 element'sradio button 5260 is not highlighted, indicating that thetreatment 5230 element contributed to the mapping while theresearch 5240 element did not. Any other mechanism of showing or otherwise providing elements that were involved in the matching of the system objects to the selected policies may be used in the GUI. - While the examples described above illustrated various functionalities in the method and system of the present disclosure being performed by various components and handlers, it is not necessary that a specific function be performed by a specific component or handler shown above. Rather, the components and handlers are illustrated as logical functional components. Thus, any one or more processing units may perform the functionalities described above.
- The system and method of the present disclosure may be implemented and run on a general-purpose computer or computer system. The computer system may be any type of known or will be known systems and may typically include a processor, memory device, a storage device, input/output devices, internal buses, and/or a communications interface for communicating with other computer systems in conjunction with communication hardware and software, etc.
- The terms “computer system” and “computer network” as may be used in the present application may include a variety of combinations of fixed and/or portable computer hardware, software, peripherals, and storage devices. The computer system may include a plurality of individual components that are networked or otherwise linked to perform collaboratively, or may include one or more stand-alone components. The hardware and software components of the computer system of the present application may include and may be included within fixed and portable devices such as desktop, laptop, and/or server. A module may be a component of a device, software, program, or system that implements some “functionality”, which can be embodied as software, hardware, firmware, electronic circuitry, or etc.
- The embodiments described above are illustrative examples and it should not be construed that the present invention is limited to these particular embodiments. Thus, various changes and modifications may be effected by one skilled in the art without departing from the spirit or scope of the invention as defined in the appended claims.
- The embodiments described above are illustrative examples and it should not be construed that the present invention is limited to these particular embodiments. Thus, various changes and modifications may be effected by one skilled in the art without departing from the spirit or scope of the invention as defined in the appended claims.
Claims (12)
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/841,298 US7711749B2 (en) | 2007-08-20 | 2007-08-20 | Privacy ontology for identifying and classifying personally identifiable information and a related GUI |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
US11/841,298 US7711749B2 (en) | 2007-08-20 | 2007-08-20 | Privacy ontology for identifying and classifying personally identifiable information and a related GUI |
Publications (2)
Publication Number | Publication Date |
---|---|
US20090055431A1 true US20090055431A1 (en) | 2009-02-26 |
US7711749B2 US7711749B2 (en) | 2010-05-04 |
Family
ID=40383139
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
US11/841,298 Expired - Fee Related US7711749B2 (en) | 2007-08-20 | 2007-08-20 | Privacy ontology for identifying and classifying personally identifiable information and a related GUI |
Country Status (1)
Country | Link |
---|---|
US (1) | US7711749B2 (en) |
Cited By (10)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20100049558A1 (en) * | 2008-08-21 | 2010-02-25 | Beigi Mandis S | System and method for automatically generating suggested entries for policy sets with incomplete coverage |
WO2012085767A1 (en) * | 2010-12-22 | 2012-06-28 | Koninklijke Philips Electronics N.V. | Creating an access control policy based on consumer privacy preferences |
US20130246237A1 (en) * | 2012-03-15 | 2013-09-19 | Aptitude, Llc | Method, apparatus, and computer program product for purchase planning |
US20150193638A1 (en) * | 2013-12-10 | 2015-07-09 | Xor Data Exchange, Inc | System and method of filtering consumer data |
US20160162589A1 (en) * | 2005-12-20 | 2016-06-09 | At&T Intellectual Property I, Lp | Methods, systems, and computer program products for implementing intelligent agent services |
CN109716345A (en) * | 2016-04-29 | 2019-05-03 | 普威达有限公司 | Computer implemented privacy engineering system and method |
US10726456B2 (en) | 2013-07-15 | 2020-07-28 | Aptitude, Llc | Method, apparatus, and computer program product for providing a virtual aggregation group |
US11017118B2 (en) * | 2018-11-30 | 2021-05-25 | International Business Machines Corporation | Cognitive survey policy management |
US11531703B2 (en) * | 2019-06-28 | 2022-12-20 | Capital One Services, Llc | Determining data categorizations based on an ontology and a machine-learning model |
US20230153457A1 (en) * | 2021-11-12 | 2023-05-18 | Microsoft Technology Licensing, Llc | Privacy data management in distributed computing systems |
Families Citing this family (6)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
GB0624577D0 (en) * | 2006-12-08 | 2007-01-17 | Skype Ltd | Communication Systems |
US10970638B2 (en) * | 2017-07-26 | 2021-04-06 | American Express Travel Related Services Company, Inc. | Personally identifiable information identification |
US10776892B2 (en) * | 2017-12-19 | 2020-09-15 | Motorola Solutions, Inc. | Device, system and method for screening of personally identifiable information |
US10885225B2 (en) | 2018-06-08 | 2021-01-05 | Microsoft Technology Licensing, Llc | Protecting personally identifiable information (PII) using tagging and persistence of PII |
US10839104B2 (en) | 2018-06-08 | 2020-11-17 | Microsoft Technology Licensing, Llc | Obfuscating information related to personally identifiable information (PII) |
US11880897B2 (en) * | 2021-10-08 | 2024-01-23 | Motorola Solutions, Inc. | Device, system, and method for sharing information of a selected media modality via communication devices |
Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US20060173868A1 (en) * | 2005-01-31 | 2006-08-03 | Ontoprise Gmbh | Mapping web services to ontologies |
US7225183B2 (en) * | 2002-01-28 | 2007-05-29 | Ipxl, Inc. | Ontology-based information management system and method |
US20080097968A1 (en) * | 2006-10-20 | 2008-04-24 | Oracle International Corporation | Knowledge extraction for automatic ontology maintenance |
-
2007
- 2007-08-20 US US11/841,298 patent/US7711749B2/en not_active Expired - Fee Related
Patent Citations (3)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US7225183B2 (en) * | 2002-01-28 | 2007-05-29 | Ipxl, Inc. | Ontology-based information management system and method |
US20060173868A1 (en) * | 2005-01-31 | 2006-08-03 | Ontoprise Gmbh | Mapping web services to ontologies |
US20080097968A1 (en) * | 2006-10-20 | 2008-04-24 | Oracle International Corporation | Knowledge extraction for automatic ontology maintenance |
Cited By (19)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
US9607091B2 (en) * | 2005-12-20 | 2017-03-28 | At&T Intellectual Property I, L.P. | Methods, systems, and computer program products for implementing intelligent agent services |
US20160162589A1 (en) * | 2005-12-20 | 2016-06-09 | At&T Intellectual Property I, Lp | Methods, systems, and computer program products for implementing intelligent agent services |
US20100049558A1 (en) * | 2008-08-21 | 2010-02-25 | Beigi Mandis S | System and method for automatically generating suggested entries for policy sets with incomplete coverage |
US8290841B2 (en) * | 2008-08-21 | 2012-10-16 | International Business Machines Corporation | System and method for automatically generating suggested entries for policy sets with incomplete coverage |
US20130312060A1 (en) * | 2010-12-22 | 2013-11-21 | Koninklijke Philips N.V. | Creating an Access Control Policy Based on Consumer Privacy Preferences |
WO2012085767A1 (en) * | 2010-12-22 | 2012-06-28 | Koninklijke Philips Electronics N.V. | Creating an access control policy based on consumer privacy preferences |
US9892279B2 (en) * | 2010-12-22 | 2018-02-13 | Koninklijke Philips N.V. | Creating an access control policy based on consumer privacy preferences |
US20180150651A1 (en) * | 2010-12-22 | 2018-05-31 | Koninklijke Philips N.V. | Creating an access control policy based on consumer privacy preferences |
JP2014506356A (en) * | 2010-12-22 | 2014-03-13 | コーニンクレッカ フィリップス エヌ ヴェ | Creating an access control policy based on consumer privacy preferences |
US20130246237A1 (en) * | 2012-03-15 | 2013-09-19 | Aptitude, Llc | Method, apparatus, and computer program product for purchase planning |
US10726456B2 (en) | 2013-07-15 | 2020-07-28 | Aptitude, Llc | Method, apparatus, and computer program product for providing a virtual aggregation group |
US11281798B2 (en) | 2013-12-10 | 2022-03-22 | Early Warning Services, Llc | System and method of filtering consumer data |
US20150193638A1 (en) * | 2013-12-10 | 2015-07-09 | Xor Data Exchange, Inc | System and method of filtering consumer data |
US10546149B2 (en) * | 2013-12-10 | 2020-01-28 | Early Warning Services, Llc | System and method of filtering consumer data |
US11841974B2 (en) | 2013-12-10 | 2023-12-12 | Early Warning Services, Llc | System and method of filtering consumer data |
CN109716345A (en) * | 2016-04-29 | 2019-05-03 | 普威达有限公司 | Computer implemented privacy engineering system and method |
US11017118B2 (en) * | 2018-11-30 | 2021-05-25 | International Business Machines Corporation | Cognitive survey policy management |
US11531703B2 (en) * | 2019-06-28 | 2022-12-20 | Capital One Services, Llc | Determining data categorizations based on an ontology and a machine-learning model |
US20230153457A1 (en) * | 2021-11-12 | 2023-05-18 | Microsoft Technology Licensing, Llc | Privacy data management in distributed computing systems |
Also Published As
Publication number | Publication date |
---|---|
US7711749B2 (en) | 2010-05-04 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
US7711749B2 (en) | Privacy ontology for identifying and classifying personally identifiable information and a related GUI | |
US20240062860A1 (en) | Systems and methods for computing with private healthcare data | |
US10382421B2 (en) | Flexible framework for secure search | |
US8943208B2 (en) | Controlling access to resources by hosted entities | |
Neumann et al. | An approach to engineer and enforce context constraints in an RBAC environment | |
US8433712B2 (en) | Link analysis for enterprise environment | |
US8875249B2 (en) | Minimum lifespan credentials for crawling data repositories | |
US8725770B2 (en) | Secure search performance improvement | |
US8429709B2 (en) | Privacy ontology for identifying and classifying personally identifiable information and a related GUI | |
US8352475B2 (en) | Suggested content with attribute parameterization | |
US8595255B2 (en) | Propagating user identities in a secure federated search system | |
US8027982B2 (en) | Self-service sources for secure search | |
US8117640B1 (en) | Systems and methods for analyzing application security policies | |
US8024339B2 (en) | Apparatus and method for generating reports with masked confidential data | |
US20030227487A1 (en) | Method and apparatus for creating and accessing associative data structures under a shared model of categories, rules, triggers and data relationship permissions | |
US20110246498A1 (en) | Context-based security policy evaluation using weighted search trees | |
US20030137536A1 (en) | Method and apparatus for communicating changes from and to a shared associative database using one-way communications techniques | |
US20070256005A1 (en) | Field-link autofill | |
US20080091637A1 (en) | Temporal association between assets in a knowledge system | |
JP2011504256A (en) | Language framework and infrastructure for secure and configurable applications | |
US20150127688A1 (en) | Facilitating discovery and re-use of information constructs | |
El Allioui et al. | User profile Ontology for the Personalization approach | |
Rachapalli et al. | Towards fine grained RDF access control | |
Stojanov et al. | Linked data authorization platform | |
O’Neill et al. | Delivering multi-agent MicroServices using CArtAgO |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
AS | Assignment |
Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION, NEW Y Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BRODIE, CAROLYN;BROWN, NIGEL;KARAT, JOHN;AND OTHERS;REEL/FRAME:020214/0211;SIGNING DATES FROM 20070808 TO 20070813 Owner name: INTERNATIONAL BUSINESS MACHINES CORPORATION,NEW YO Free format text: ASSIGNMENT OF ASSIGNORS INTEREST;ASSIGNORS:BRODIE, CAROLYN;BROWN, NIGEL;KARAT, JOHN;AND OTHERS;SIGNING DATES FROM 20070808 TO 20070813;REEL/FRAME:020214/0211 |
|
FEPP | Fee payment procedure |
Free format text: PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: LARGE ENTITY |
|
REMI | Maintenance fee reminder mailed | ||
LAPS | Lapse for failure to pay maintenance fees | ||
STCH | Information on status: patent discontinuation |
Free format text: PATENT EXPIRED DUE TO NONPAYMENT OF MAINTENANCE FEES UNDER 37 CFR 1.362 |
|
FP | Lapsed due to failure to pay maintenance fee |
Effective date: 20140504 |